Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
Moderate severity
GitHub Reviewed
Published
Aug 2, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
<= 1.4.358.30
Patched versions
1.4.359.31
Description
Published by the National Vulnerability Database
Apr 22, 2020
Reviewed
May 25, 2021
Published to the GitHub Advisory Database
Aug 2, 2021
Last updated
Feb 1, 2023
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
References